Eliciting and utilising knowledge for security event log analysis: an association rule mining and automated planning approach

Research output: Contribution to journalArticle

7 Citations (Scopus)